RENAISSANCE CYBER EXPO & CONFERENCE IRELAND 2022 – TWO WEEKS TO GO!
Michael Conway
Director at Renaissance | Cyber Security | Encryption Devices | Business Continuity
There are just over two weeks to go until the Cyber Expo & Conference Ireland returns as an in-person event at The Leopardstown Pavilion for the first time in two years! Open to anyone working in an IT sector supplier and to decision-makers and IT & cybersecurity professionals working for public and private sector organisations, the Expo & Conference is not an event you’ll want to miss.
I recently sat down with Tech Central to discuss what we can expect at this year the event. I spoke about how Cyber Expo Ireland was designed to demystify cyber-security and help organisations stay up to date with the latest trends, which has never been more essential. You can read the full interview?here.
Cyber Expo & Conference has two components:
Meeting Bookings have now opened! If you would like to book meetings with any of our vendors ahead of the event, please do so?here.??But make sure you are registered for the event first or your meeting won't be confirmed!
Keynote Speaker
Paul C Dwyer will give the opening keynote speech. Paul is the CEO of Cyber Risk International (CRI), the President of the International Cyber Threat Task Force (ICTTF) and is recognised as one of the foremost global experts in cybersecurity.
As the CEO of CRI, Paul specialises in corporate and enterprise security, the development of cyber defence programs, and business operations protection for a wide selection of clients. As founder and President of the ICTTF International Cyber Threat Task Force, he advocates for diversity in the industry and leads a community of over 30,000 with a common goal to defeat cyber evil. You can connect with Paul via his?LinkedIn account.
Paul’s Keynote address will focus on the EU Cyber Strategy rules to make physical and digital entities more resilient across all member states as a critical component of the overarching “Shaping Europe’s Digital Future” strategy. More details of the Keynote are available?here.
The Identity & Rights Management Stream
Probably one of the most challenging security areas with Organisations transitioning to cloud services and mobile devices to cut costs and boost productivity. The focus will include information security policies, target operating models, assessing risk for access management, Implementing IT Controls and business education & awareness.
Stream Lead - Dr Vivienne Mee, Founder, VM Group
Vivienne is the founder of VM Group, a global firm operating since 2014. Throughout her career, Vivienne has worked on large electronic discovery cases both in Ireland and across Europe with various forensic teams. As part of her PhD studies, Vivienne was a member of the Information Security Research Group at the University of Glamorgan. Here, she spent many years working at their Forensic Laboratory, investigating cybercrimes and the latest trends that fed into extensive research with the Serious Organised Crime Agency (SOCA), Ministry of Defence, Defence Science & Technology Labs, and UK Security Service (MI5).
The Identity & Rights Management Stream Speakers
Simon Broadbent - Entrust. Simon will be presenting on how to secure the
hybrid workforce using a zero-trust approach.
Geoff Bartlett - Ascertia. Geoff will be discussing how to establish trust and assurance in the digital world.
Sabrina Hamed - Systancia. Sabrina will address how Privileged Access Management (PAM) solutions allow you to protect your critical IT assets against cyber-attacks.
lain Beveridge - Entrust. Iain will cover how to secure cloud-based services by proper security and management of digital keys.
David Lello - Burning Tree. David will outline how customer identity innovations are spearheading adaptions to ongoing digital change.
The OT Cybersecurity Stream
Operational technology controls the built environment that we all rely on every day. From power generation and distribution, through city infrastructure & transport services, to drinking & wastewater systems, plus many more, OT provides the digital interface between the physical and the cyber realms. This stream will cover how to protect this vital infrastructure.
Stream Lead - Paul Hearns, Business Owner, PJH Consulting
Paul is an experienced technology content strategist, presenter, facilitator, journalist, and commentator who provides content strategy and services to the technology industry via PJH Consulting. In his previous role, Paul was Head of Content for Mediateam, with oversight for its Tech Network portfolio, including the TechFire and TechLive event series.
Having begun his career in the aerospace industry, Paul Hearns started working as a freelance journalist in 1998, with a background in web development and network management. He was in charge of the tech publications and events within the Mediateam portfolio for over a decade. This included all the technology publications (TechPro (formerly ComputerScope), TechTrade (formerly Irish Computer) and Techcentral.ie). He was also chair of the TechFire series of technology briefings.
The OT Cybersecurity Stream Speakers
Roman Cupka - Progress Flowmon.?Roman will be providing information and guidance on how enhanced visibility and security monitoring on interoperable IT/OT networks provides insight into protecting OT monitored infrastructure and bridging IT in place.
Desiree lee – Armis.?Desiree will provide guidance on best practise when it comes to securing critical infrastructure, she will also discuss the rise of national cyber threats.
Rohan Vermeulen – Oleson. Rohan?will cover how OT and IoT solutions make cybersecurity better and how to approach Cyber Security for OT and Industrial Control Systems (ICS) in general.
The Business Email Compromise Stream
Email is still the primary communications tool in business, even with the rise in solutions like Slack and Microsoft Teams. It is also a prime target for cybercriminals.?Implementing email security protection for an email domain is an important and necessary part of a modern cybersecurity strategy. It can protect your users, your business partners, and your brand.
This stream will discuss BEC attacks, a form of cybercrime where email is fraudulently used to attack organisations to achieve a specific outcome that will detrimentally affect the target organisation.
Stream Lead - Alex Burnham, Director, IT Audit & Security, Mazars
Alex is a certified IT security professional, IT auditor and network administrator with twenty-four years of experience in IT operations and network management, risk, compliance, and audit. An IT audit and security manager with both technical and auditing experience in the financial, health, higher education, public and private sectors. Alex’s background includes 17 years in the British Army, managing people and IT in high-pressure environments.
The Business Email Compromise Stream Speakers
Colin Wright - Hornet Security.?Colin will be covering how Hornet Security’s solutions can protect email on-premise and in the cloud. He will also be talking about BEC protection in general.
Harry Frearson?of?Red Sift?will join Colin and Alex for the BEC stream. He will explain how business Email compromise has been the highest-earning cybercrime type for the last 2 years and will provide real-life examples. Join this session to discover why email is still your biggest problem.
The Compliance & Third-Party Risk Management Stream
Businesses and other organisations operate in a complex environment. Each has multiple partners and supply-chain vendors with whom they exchange information. Increasingly this information exchange is via digital channels and incorporates integration between the IT systems of various organisations. While this integration has made business transactions much more straightforward and has provided widespread benefits, it has also increased cybersecurity risk.
This stream will give you insights into planning a multi-supplier cybersecurity strategy and highlight how vital an organisation’s cybersecurity profile and hygiene are in relation to its cyber safety.
Stream Lead - Carmel Somers, Human Capital Strategist, ICT Skillnet
Carmel is an Organisational Psychologist and is ICT Skillnet’s Human Capital Strategist supporting organisations in Ireland to develop and implement their future work strategies.?Before joining ICT Skillnet, Carmel held many senior roles in research & development, consulting services, operations, and IBM’s “technology for good” programme.?Carmel is chair of Technology Ireland ICT Skillnet’s Cybersecurity Skills Initiative (CSI) and a member of the board of Cyber Ireland, where she leads the Talent & Skills, working group.?In addition, she is a member of the Education and Skills working group of Blockchain Ireland and a member of the External Advisory Board of the Irish Institute of Digital Business (DCU).
The Compliance & Third-Party Risk Management Stream Speakers
Dov Goldman - Panorays.?Dov will be covering the best practices to Address third-party security risks effectively.
Denis Ryan - National Standards Authority for Ireland (NSAI). Denis will discuss cyber resilience and the impact of the future EU cybersecurity certification framework.
Chris Page – iboss.?Chris will discuss Zero Trust Edge architecture, key features & capabilities, and highlight how the very success of cloud-first security strategies, and how projects such as Zero Trust, are intrinsically linked to the cloud security architecture you adopt.
The Application Security Stream
This stream will consider application security within an application to stop the app data or code from being copied or hijacked. Hardware, software, and processes that diminish security weaknesses can all be considered under the application security umbrella.
Stream Lead - Gary Robinson, CEO, Uleska
Gary is an application security professional and innovator with a proven track record of architecting, coding, evaluating, and testing secure software systems. Gary has a strong software security background with an emphasis on secure software development, built from over 20 years of experience developing, securing, and pen-testing complex applications.
Gary has architected and threat modelled applications at one of the world’s largest banks and has created industry reference documents on secure coding and led sessions in conferences through the OWASP organisation. Having implemented software security processes in multiple small and enterprise companies, Gary works with industries to increase the integration of application security practices and explore ways to make security a friction-less aspect of the software development lifecycle.
The Application Security Stream Speakers
Andrew Thompson - Checkmarx.?Andrew will be covering the Checkmarx Six Pillars of Application Security framework and how it can enhance your application cybersecurity.
Kev Breen - Immersive Labs. Kev will cover the essential points to ensure application security in the modern world.
Michael O’Brien - Progress Kemp. Michael will discuss a zero-trust approach to application security.
领英推荐
Securing Beyond the Microsoft Security Stack Stream
Microsoft Office 365 has many security features and capabilities built-in. However, there might be suspicious account login attempts from outside the office, data exfiltration from SharePoint or phishing emails may arrive in your customer’s email. This stream will show you how you can significantly improve your cybersecurity stance with some easy changes to system configuration and business practices.
Stream Lead - Redmond O'Leary, Executive Business Advisor
Redmond is a highly experienced sales and commercial manager with a technical background who has worked with some of the world’s largest technology organisations, including IBM, Gartner, Oracle, and the Irish companies Version 1 and BPSL. Redmond’s career spanning 30 years in different industries has enabled him to build a broad skill base with deep expertise in the challenges faced by large multinational and smaller indigenous companies.
The Securing Beyond the Microsoft Security Stack stream Speakers
Martin Lethbridge - WatchGuard. Martin will discuss the cybersecurity insights needed for defence in an evolving threat landscape.
Steven Wood - Carbonite Webroot. Steven will outline how to cultivate a proactive security posture for a connected world.
Charles Smith - Barracuda. Charles will delve into how to mitigate the risk from ransomware and Microsoft 365 data loss using cloud-based protection solutions.
Dan Pitman - Bitdefender. Dan will talk about cyber resilience for the 21st?century.
Richard Waters - Censornet. Richard will address how to use SASE (Security Access Service Edge) to plan for smart cybersecurity protections in the future.
Kalle Jaaskelainen – Cyglass. Kalle will discuss the expanding threat protection from the Network to the Cloud with NDaaS.
The Cyber Security in Healthcare Stream
2021 was a turbulent year for the Irish Healthcare system. A highly publicised outage due to a ransomware attack from the Conti Ransomware gang made headlines for all the wrong reasons. This stream will feature experts in cybersecurity and healthcare systems, and it will include a discussion on the general state of cybersecurity in healthcare in Ireland and internationally, the major threats, why healthcare is specifically vulnerable & targeted, how to mitigate threats in affordable ways and manage them within the constraints in the healthcare sector. If you are involved in cybersecurity in healthcare or are a decision-maker in the healthcare sector, this stream will be of special interest.
Stream Lead - Emmet Ryan, Connected Editor, Business Post
Emmet Ryan is the editor of Connected magazine and a business & technology correspondent at the Business Post. Emmet has worked as a freelance journalist since 2005 and has worked with nearly every Irish national broadcast and print media organisation in some capacity. As the Connected Editor with the Sunday Business Post, Emmet manages Ireland’s largest technology magazine and reports on business and technology for the main paper.
The Cyber Security in Healthcare Stream Speakers
Andrew Grant - Bullwall.?Andrew will discuss why healthcare providers and administrative organisations in the sector are a target for ransomware and why they will continue to be targeted in the future.
Xavier Hameroux - Systancia. Xavier will cover how Privileged Access Management (PAM) solutions allow organisations to comply with the most demanding regulations in healthcare (such as HIPAA in the USA)?
Raluca Saceanu – Smarttech247.?Raluca will?share her insights into the state of?cybersecurity?in?healthcare?in Ireland and the importance of?setting?a?foundation?for?zero trust?today.
Desiree Lee of Armis?will join the experts above to discuss Cyber Security in healthcare from a Global Perspective. Further details of her presentation will be confirmed shortly. Keep an eye on the?website?for updates.
The Always-on Computing Stream
As computing becomes more sophisticated, always-on systems have started to replace older on-demand systems that functioned on different types of resources. ‘Always On’ systems are continuously available, plugged in, or connected to power sources and networks. They continue to hum along throughout the day and night, offering more simple, smart, and fast application experiences. This stream aims to provide an insight into the impact of ‘Always On’ Technology.
Stream Lead - Sean Reynolds, CEO, Rits Information Security
Sean is a former Management Consultant and IT Security specialist with AIB group who formed his own Information Security consulting firm in 1990. This firm evolved into the first Irish company dedicated solely to providing Information Security services and solutions. Sean was a founder member and chairman of the ACF2 User Group here in Ireland, which is now known as the Irish Information Security Forum (IISF), for which is he now a Fellow.
The assignments that Rits, and specifically Sean, are engaged in involve cyber and information security risk management and prevention along with their associated technologies, policies, and processes. In addition to leading “Tiger and Red Teams” in penetration testing, Rits also provides specialist advisory services to ensure the integrity and effectiveness of information security management, technology, and solutions.
The Always-on Computing Stream Speakers
Daniel March - Zyxel Networks. Daniel will outline how you can implement a just connect solution that delivers a hassle-free network management infrastructure using Zyxel’s Nebula platform.
Andy Walsh - Bullwall. Andy will cover all things ransomware-related and hopefully, make you understand that you should adopt a when not if mindset when it comes to ransomware attacks. And what you should do about it to protect against the attacks.
Steven DeWinter - Awingu.?Would you like to deliver applications securely to any user on any device with a browser? Steven will cover how Awingu lets you do just that.
The Digital Transformation Masterclass
There are many elements required for a successful digital transformation programme, but the reality is that 70% of such projects fail. This masterclass with world-renowned industry expert Professor Niall McKeown will demystify the process by taking you through a whistle-stop tour of the five change blocks needed for a successful digital transformation.
Masterclass Lead - Prof. Niall McKeown
Prof. Niall McKeown is CEO of Ionology and creator of several of the world’s most advanced and widely used digital transformation frameworks and models. An award-winning strategy consultant, world-renowned thought-leader and in-demand public speaker on digital transformation and artificial intelligence – Niall has a 22-year track record of delivering game-changing strategies for public and private sector organisations across the globe. He is a visiting professor at Ulster University and lectures at the M?ller Institute, University of Cambridge. He is also the writer and presenter of the world’s most-watched YouTube channel on digital transformation.
What to Expect during the Digital Transformation Masterclass?
Artificial Intelligence (AI) stands to change almost every industry over the coming years. Leaders, managers, and decision-makers need to know how to navigate the digital transformation landscape.
This will be a very entertaining and interactive session where you will get the opportunity to score your business and its performance in the digital economy. The results constantly amaze people.
The session is designed for a non-technical audience and will include a Q&A at the end.
Note that you need to register for this masterclass in addition to and separately from the broader Expo & Conference registration. You can?register here.
The Capture the Flag Session
It is widely accepted that everyone in business, whether communicating, trading online, or working within cloud-based networks, needs to be aware of cyber risks and threats. This Capture the Flag breakout session is a unique, fun, and engaging way to learn cybersecurity concepts and gain new skills.?No cybersecurity skills are required!?The session demonstrates how vulnerable computer technology is and helps participants become more aware and skilled at recognising and defending against attacks.
Whom is this aimed at?
Regardless of background or skill set, this session is suitable for all ability levels. If you know how to use a web browser, you’re ready to participate. Equally, if you are an experienced cybersecurity professional, there are challenges withing to suit all levels. If you enjoy solving puzzles, want to learn a little about cybersecurity or just want to challenge yourself, register for the Capture the Flag session!
Note that you register for Capture the Flag via the Eventbrite page, learn more about the session?here.
The National Cyber Security Discussion
This year’s Cyber Expo & Conference Ireland is also proud to host a national cyber discussion debate:?“National Cyber Security Discussion – Is Ireland Ready?”?where an interactive forum will debate opinions on Ireland’s Cyber Status and explore if there are concrete initiatives that could be taken to help bolster Ireland’s cyber resilience.
Led by Paul C Dwyer, President of the ICTTF International Cyber Threat Task Force, and recognised as one of the world’s foremost experts on cyber security, risk and privacy; this event is not to be missed and will run from 3.30-5pm on the day!
The panel discussion will definitely NOT disappoint?and will include top industry experts. Find out more about the session and our panel?here.
Note that you register for this session via the?Eventbrite?page.
Competition Time!
Renaissance has announced a weekly draw as we count down to the big event! We are giving away a Cyber Expo Branded bottle of?3 Square Miles Irish Cask Gin?– We have 3 bottles to give away before the event – make sure you are registered to be in with a chance to win! The winners will collect their prizes at the event on 28th?April.
How to Register for the Expo & Conference
You can find more information about the exhibitors, speakers and their presentation topics on the?Cyber Expo & Conference Ireland?website. You can also book meetings via the Exhibitors page. Alternatively, you can register via the?Eventbrite?page.
?
We look forward to welcoming you on the 28th?of April!
?